All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-403: Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
Learn about CWE-403 (Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-404: Improper Resource Shutdown or Release
Learn about CWE-404 (Improper Resource Shutdown or Release), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-405: Asymmetric Resource Consumption (Amplification)
Learn about CWE-405 (Asymmetric Resource Consumption (Amplification)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-406: Insufficient Control of Network Message Volume (Network Amplification)
Learn about CWE-406 (Insufficient Control of Network Message Volume (Network Amplification)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-407: Inefficient Algorithmic Complexity
Learn about CWE-407 (Inefficient Algorithmic Complexity), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-408: Incorrect Behavior Order: Early Amplification
Learn about CWE-408 (Incorrect Behavior Order: Early Amplification), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-409: Improper Handling of Highly Compressed Data (Data Amplification)
Learn about CWE-409 (Improper Handling of Highly Compressed Data (Data Amplification)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-41: Improper Resolution of Path Equivalence
Learn about CWE-41 (Improper Resolution of Path Equivalence), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-410: Insufficient Resource Pool
Learn about CWE-410 (Insufficient Resource Pool), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-412: Unrestricted Externally Accessible Lock
Learn about CWE-412 (Unrestricted Externally Accessible Lock), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-413: Improper Resource Locking
Learn about CWE-413 (Improper Resource Locking), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified